Monday, June 10, 2024

Entering Text


In order to enter the first lines of text, whether it is the award winning novel you are writing, a recipe for chocolate brownies or your letter of resignation to your boss from hell, you have to start with either an existing document or a blank document.

1.  When you launch Microsoft Word, a blank document will automatically open.  Depending on your computer screen size and your document zoom, it may look like this:


2.  The white area that makes up the majority of the screen is 
a visual representation of a page.  To add text to the first page, use your mouse to click on the page and start typing by using your keyboard to add text.

3.  You will see a blinking short vertical line on your screen.  This indicates where the next letter you type will appear.

4.  To insert spaces between words, use the spacebar on your keyboard.

5.  To insert a new paragraph, press the Enter key on your keyboard.

6.  To add capital letters, hold down the Shift key on your keyboard whilst pressing the letter on your keyboard you wish to capitalize in your text.

7.  You may notice that on your keyboard there are keys that have two or more characters on them.  To insert the character located at the top of the key, hold down the Shift key whilst pressing the required key.

8.  Pressing the Caps Lock key on your keyboard once and then typing will allow you to type in capital letters.  To switch Caps Lock off and return to normal case, press the Caps Lock key again (only once).

Selecting Text

The fundamentals of selecting text are often overlooked when a user learns Microsoft Word.  This frequently leads to less effective use of the program and even frustration.  Imagine you learnt how to make chocolate brownies, but you missed the lesson on how to use the mixer.  You may still be manually mixing your ingredients whilst there is a more expedient way i.e.: using the mixer.  Depending on your baking skills, your brownies will still come out perfect, but I'm sure you agree there is little benefit in mixing batter manually when it can be done quicker!

The ability to quickly select text in Word can make the difference between spending minutes or hours editing text.  To select general sections of text, use your mouse by holding down the left mouse button and dragging through the text you wish to select.

1.  To select a single word, use your mouse to move the cursor to the word you wish to select.

2.  Double-click the word in quick succession using the left mouse button.

3.  You will be able to observe the selected word by noting that it is highlighted or shaded in blue.  Spot the selected word in the screenshot below:



4.  To deselect a selected word, 
use your mouse to left click anywhere in the document.

5.  To select an entire line of text, move your mouse cursor to the left-hand margin of the page next to the line you wish to select.  Hover and move your cursor until it changes into a right-pointing arrow.

6.  Once your cursor changes to a right-pointing arrow, left-click once to select the entire line of text.  Take note of the arrow position and selected text in the screenshot below:


7.  You can select multiple adjacent lines after selecting a first line (as above).  Hold down your left mouse button whilst dragging your cursor upwards or downwards to select lines. 

8.  Let go of the left mouse button once you have selected all the relevant lines.  They will remain selected until you click in the document.

9.  When editing text, it is often necessary to select an entire sentence.  To do this, hold down the Ctrl key on your keyboard and click once in the sentence you wish to select.

10.  To select a paragraph requires a "trigger-happy" finger as you need to triple click (left-mouse button) in the paragraph you wish to select.

11.  To select specific lines/words or paragraphs that are dispersed throughout the document making it impossible to use the drag function described above.  To select non-adjacent pieces of text (words, paragraphs or sentences), hold down the Ctrl key on your keyboard whilst making multiple selections.

12.  Finally, you may need to select all the text contained in your document when you, for example, want to change the font of all text.

13.  To select all, move your cursor to the left-hand side margin area of your document until it changes into a right-pointing arrow (as pictured in screenshot above).  Once you see the right-pointing arrow, triple click to select the whole document.

 

Getting Started with Word

Introduction

Microsoft Word is a word processing application that allows you to create a variety of documents, including letters, resumes, and more. In this lesson, you'll learn how to navigate the Word interface and become familiar with some of its most important features, such as the RibbonQuick Access Toolbar, and Backstage view.

 

The Word interface

When you open Word for the first time, the Start Screen will appear. From here, you'll be able to create a new document, choose a template, and access your recently edited documents. From the Start Screen, locate and select Blank document to access the Word interface.

Click the buttons in the interactive below to learn more about the Word interface.

 

Working with the Word environment

All recent versions of Word include the Ribbon and the Quick Access Toolbar, where you'll find commands to perform common tasks in Word, as well as Backstage view.

The Ribbon

Word uses a tabbed Ribbon system instead of traditional menus. The Ribbon contains multiple tabs, which you can find near the top of the Word window.

Each tab contains several groups of related commands. For example, the Font group on the Home tab contains commands for formatting text in your document.

Some groups also have a small arrow in the bottom-right corner that you can click for even more options.

Showing and hiding the Ribbon

If you find that the Ribbon takes up too much screen space, you can hide it. To do this, click the Ribbon Display Options arrow in the upper-right corner of the Ribbon, then select the desired option from the drop-down menu:

  • Auto-hide Ribbon: Auto-hide displays your document in full-screen mode and completely hides the Ribbon from view. To show the Ribbon, click the Expand Ribbon command at the top of screen.
  • Show Tabs: This option hides all command groups when they're not in use, but tabs will remain visible. To show the Ribbon, simply click a tab.
  • Show Tabs and Commands: This option maximizes the Ribbon. All of the tabs and commands will be visible. This option is selected by default when you open Word for the first time

Using the Tell me feature

If you're having trouble finding a command you want, the Tell Me feature can help. It works just like a regular search bar. Type what you're looking for, and a list of options will appear. You can then use the command directly from the menu without having to find it on the Ribbon.

The Quick Access Toolbar

Located just above the Ribbon, the Quick Access Toolbar lets you access common commands no matter which tab is selected. By default, it shows the SaveUndo, and Redo commands, but you can add other commands depending on your needs.

To add commands to the Quick Access Toolbar:

  1. Click the drop-down arrow to the right of the Quick Access Toolbar.
  2. Select the command you want to add from the menu.
  3. The command will be added to the Quick Access Toolbar.

The Ruler

The Ruler is located at the top and to the left of your document. It makes it easier to adjust your document with precision. If you want, you can hide the Ruler to create more screen space.

To show or hide the Ruler:

  1. Click the View tab.
  2. Click the checkbox next to Ruler to show or hide the Ruler.

Backstage view

Backstage view gives you various options for saving, opening a file, printing, and sharing your document. To access Backstage view, click the File tab on the Ribbon.

Click the buttons in the interactive below to learn more about using Backstage view.

Document views and zooming

Word has a variety of viewing options that change how your document is displayed. You can choose to view your document in Read ModePrint Layout, or Web Layout. These views can be useful for various tasks, especially if you're planning to print the document. You can also zoom in and out to make your document easier to read.

Switching document views

Switching between different document views is easy. Just locate and select the desired document view command in the bottom-right corner of the Word window.

  • Read Mode: This view opens the document to a full screen. This view is great for reading large amounts of text or simply reviewing your work.
  • Print Layout: This is the default document view in Word. It shows what the document will look like on the printed page.
  • Web Layout: This view displays the document as a webpage, which can be helpful if you're using Word to publish content online.

Zooming in and out

To zoom in or out, click and drag the zoom control slider in the bottom-right corner of the Word window. You can also select the + or - commands to zoom in or out by smaller increments. The number next to the slider displays the current zoom percentage, also called the zoom level.

Challenge!

  1. Open Word, and create a blank document.
  2. Change the Ribbon Display Options to Show Tabs.
  3. Using Customize Quick Access Toolbar, add NewQuick Print, and Spelling & Grammar.
  4. In the Tell me bar, type Shape and press Enter.
  5. Choose a shape from the menu, and double-click somewhere on your document.
  6. Show the Ruler if it is not already visible.
  7. Zoom the document to 120%.
  8. Change the Document view to Web Layout.
  9. When you're finished, your document should look something like this
  10. Change the Ribbon Display Options back to Show Tabs and Commands, and change the Document View back to Print Layout

 

Friday, June 7, 2024

Operating system security


  • Installing updated antivirus engines and software

  • Scrutinizing all incoming and outgoing network traffic through a firewall

  • Creating secure accounts with required privileges only (i.e., user management)

 We're going to discuss following topics in this chapter.

  • Authentication

  • One Time passwords

  • Program Threats

  • System Threats

  • Computer Security Classifications

Authentication

Authentication refers to identifying each user of the system and associating the executing programs with those users. It is the responsibility of the Operating System to create a protection system which ensures that a user who is running a particular program is authentic. Operating Systems generally identifies/authenticates users using following three ways −

  • Username / Password − User need to enter a registered username and password with Operating system to login into the system.

  • User card/key − User need to punch card in card slot, or enter key generated by key generator in option provided by operating system to login into the system.

  • User attribute - fingerprint/ eye retina pattern/ signature − User need to pass his/her attribute via designated input device used by operating system to login into the system.

One Time passwords

One-time passwords provide additional security along with normal authentication. In One-Time Password system, a unique password is required every time user tries to login into the system. Once a one-time password is used, then it cannot be used again. One-time password are implemented in various ways.

  • Random numbers − Users are provided cards having numbers printed along with corresponding alphabets. System asks for numbers corresponding to few alphabets randomly chosen.

  • Secret key − User are provided a hardware device which can create a secret id mapped with user id. System asks for such secret id which is to be generated every time prior to login.

  • Network password − Some commercial applications send one-time passwords to user on registered mobile/ email which is required to be entered prior to login.

Program Threats

Operating system's processes and kernel do the designated task as instructed. If a user program made these process do malicious tasks, then it is known as Program Threats. One of the common example of program threat is a program installed in a computer which can store and send user credentials via network to some hacker. Following is the list of some well-known program threats.

  • Trojan Horse − Such program traps user login credentials and stores them to send to malicious user who can later on login to computer and can access system resources.

  • Trap Door − If a program which is designed to work as required, have a security hole in its code and perform illegal action without knowledge of user then it is called to have a trap door.

  • Logic Bomb − Logic bomb is a situation when a program misbehaves only when certain conditions met otherwise it works as a genuine program. It is harder to detect.

  • Virus − Virus as name suggest can replicate themselves on computer system. They are highly dangerous and can modify/delete user files, crash systems. A virus is generatlly a small code embedded in a program. As user accesses the program, the virus starts getting embedded in other files/ programs and can make system unusable for user

System Threats

System threats refers to misuse of system services and network connections to put user in trouble. System threats can be used to launch program threats on a complete network called as program attack. System threats creates such an environment that operating system resources/ user files are misused. Following is the list of some well-known system threats.

  • Worm − Worm is a process which can choked down a system performance by using system resources to extreme levels. A Worm process generates its multiple copies where each copy uses system resources, prevents all other processes to get required resources. Worms processes can even shut down an entire network.

  • Port Scanning − Port scanning is a mechanism or means by which a hacker can detects system vulnerabilities to make an attack on the system.

  • Denial of Service − Denial of service attacks normally prevents user to make legitimate use of the system. For example, a user may not be able to use internet if denial of service attacks browser's content settings.

Computer Security Classifications

As per the U.S. Department of Defense Trusted Computer System's Evaluation Criteria there are four security classifications in computer systems: A, B, C, and D. This is widely used specifications to determine and model the security of systems and of security solutions. Following is the brief description of each classification.

S.N.Classification Type & Description
1

Type A

Highest Level. Uses formal design specifications and verification techniques. Grants a high degree of assurance of process security.

2

Type B

Provides mandatory protection system. Have all the properties of a class C2 system. Attaches a sensitivity label to each object. It is of three types.

  • B1 − Maintains the security label of each object in the system. Label is used for making decisions to access control.

  • B2 − Extends the sensitivity labels to each system resource, such as storage objects, supports covert channels and auditing of events.

  • B3 − Allows creating lists or user groups for access-control to grant access or revoke access to a given named object.

3

Type C

Provides protection and user accountability using audit capabilities. It is of two types.

  • C1 − Incorporates controls so that users can protect their private information and keep other users from accidentally reading / deleting their data. UNIX versions are mostly Cl class.

  • C2 − Adds an individual-level access control to the capabilities of a Cl level system.

4

Type D

Lowest level. Minimum protection. MS-DOS, Window 3.1 fall in this category.

Thursday, June 6, 2024

Operating System Properties



The Properties of Operating System are:

  1. Batch processing
  2. Multitasking
  3. Multi-programming
  4. Interactivity
  5. Real-Time System
  6. Distributed Environment
  7. spooling

1. Batch Processing

In Batch Processing, the OS first gathers the data and programs together in a batch, then processing starts.

The operating system performs various types of activities related to batch processing:

  • In this, the operating system defines the set of jobs that are re-assigned to a command sequence, data, and programs within a single unit.
  • The operating system keeps the list of jobs in the memory then executes it one by one according to the scheduling algorithm.
  • In this, the job is processed based on FCFS Scheduling means first-come, first-serve.

Advantage of Batch Processing

The performance is increased because a new job is started early when the old job gets completed without any manual interference.

Disadvantages of Batch Processing

  • Sometimes jobs are entered in an infinite loop.
  • Debugging the program is tough.

2. Multitasking

Multitasking is a technique in which the CPU executes a number of jobs within the same time by switching among the jobs. The task of switching the job is so frequent that the user will be able to communicate with each program when the program is running.

The operating system performs the following activities in the context of multitasking.

  • In this, the user directly instructs the OS or the program, and then obtain a fast response.

  • The Operating system manages multitasking in such a way so that multiple operations can be handled at the same time.
  • It is also known as a time-sharing system.

  • Multitasking operating systems are developed so that we can use the computer system interactively at a less price.

3. Multi-programming

Multi-programming is defined as sharing of the processor when two or more programs exist in the memory at a time. With the help of multi-programming, the CPU utilization efficiency can be increased. In other words, Multi-programming is defined as the capability of an Operating system to run more than one program on a single processor. Example of Multi-programming: A computer can run excel and firebox browser simultaneously.

Advantages of Multi-programming

  • Efficient CPU utilization.

  • The users assume that CPU is simultaneously working on multiple programs.

Disadvantages of Multi-programming

  • It needs CPU scheduling.

  • Memory management is needed to accommodate different jobs in memory.

4. Interactivity

Interactivity means the user’s ability to interact with a computer system.

The operating system performs various activities related to interactivity.

  • Handling input devices in order to take the input from the user. Example: – keyboard.

  • It also helps to handle output devices to display output to the user. Example: – Monitor.

  • It provides an interface to the user, so that the user can interact with the system.

5. Real-Time System

We can understand the Real-time system as the dedicated embedded systems,

An operating system performs various tasks related to a real-time system.

  • In a real-time system, the operating system reads and reacts with the help of sensor data.

  • The Operating system provides the assurance that the event is completed within a fixed interval of time to provide accurate performance.

6. Distributed Environment

A Distributed environment defines a set of multiple independent processors or CPUs in a single computer system.

The Operating system performs various activities, such as:

  • The Operating system handles the communications between processors, and communication is done with the help of communication lines.

  • Operating system share computation logic’s among different physical processors.

  • The processors will not share the memory; rather, each processor has its own local memory.

7. Spooling

Spooling stands for Simultaneous peripheral operation online. Spooling is a process in which jobs are put into a buffer, disk, or a particular area in the memory so that a device can access these jobs when it is ready.

Spooling is effective because, with the help of spooling devices can access the data with different rates. Buffer offers a waiting station so that data can respite at the time when the slower device catches up. The application of spooling is Print Spooling.

The operating system performs various tasks related to spooling:

  • It manages the I/O device data spooling when devices have multiple data access rates.

  • Handles parallel computation because the process of spooling is done I/O in a parallel way.

  • Handles the spooling buffer that provides the waiting station for the data to take rest in that time when the slower device catches up.

Advantages of Spooling

  • Spooling can overlap the I/O operation for one process with processor operations for another process.

  • It uses disk as a huge buffer for the spooling operations.

 

Editing Microsoft Word document

Open the file that you want to edit. Choose from the following tasks:   Task Steps Edit text Click the Edit tab. Select the text...